Mobile hybrid intrusion detection: the MOVICAB-IDS system
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg
Springer
2011
|
Schriftenreihe: | Studies in computational intelligence
334 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | 146 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642182983 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037281912 | ||
003 | DE-604 | ||
007 | t | ||
008 | 110315s2011 ad|| |||| 00||| eng d | ||
016 | 7 | |a 1008972541 |2 DE-101 | |
020 | |a 9783642182983 |9 978-3-642-18298-3 | ||
035 | |a (OCoLC)846285937 | ||
035 | |a (DE-599)DNB1008972541 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Herrero, Álvaro |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile hybrid intrusion detection |b the MOVICAB-IDS system |c Álvaro Herrero and Emilio Corchado |
264 | 1 | |a Berlin ; Heidelberg |b Springer |c 2011 | |
300 | |a 146 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 334 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Nachrichtenverkehr |0 (DE-588)4265845-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Visualisierung |0 (DE-588)4188417-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fallbasiertes Schließen |0 (DE-588)4363288-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neuronales Netz |0 (DE-588)4226127-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehragentensystem |0 (DE-588)4389058-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Visualisierung |0 (DE-588)4188417-6 |D s |
689 | 0 | 3 | |a Mehragentensystem |0 (DE-588)4389058-1 |D s |
689 | 0 | 4 | |a Fallbasiertes Schließen |0 (DE-588)4363288-9 |D s |
689 | 0 | 5 | |a Neuronales Netz |0 (DE-588)4226127-2 |D s |
689 | 0 | 6 | |a Nachrichtenverkehr |0 (DE-588)4265845-7 |D s |
689 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Corchado, Emilio |e Verfasser |0 (DE-588)1034345389 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Mobile Hybrid Intrusion Detection |
830 | 0 | |a Studies in computational intelligence |v 334 |w (DE-604)BV020822171 |9 334 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3631576&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021194698&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-021194698 |
Datensatz im Suchindex
_version_ | 1805095589115854848 |
---|---|
adam_text |
IMAGE 1
CONTENTS
ABBREVIATION VII
PREFACE IX
1 INTRODUCTION 1
2 VISUALISATION, ARTIFICIAL INTELLIGENCE, AND SECURITY 3
2.1 COMPUTER SYSTEM SECURITY 3
2.2 INTRUSION DETECTION SYSTEMS 8
2.2.1 A GENERAL ARCHITECTURE FOR ID 10
2.2.2 IDS TAXONOMY 11
2.3 VISUALISATION FOR NETWORK SECURITY 13
2.4 VISUALISATION TECHNIQUES 15
2.5 ARTIFICIAL NEURAL NETWORKS 18
2.5.1 ARTIFICIAL NEURON 19
2.5.2 LEARNING ALGORITHMS 19
2.5.3 HEBBIAN LEARNING 21
2.5.4 ANTI-HEBBIAN LEARNING 22
2.5.5 COMPETITIVE LEARNING 22
2.5.6 PRINCIPAL COMPONENT ANALYSIS 23
2.5.7 OJA'S WEIGHTED SUBSPACE ALGORITHM 25
2.5.8 NEGATIVE FEEDBACK NETWORK 26
2.5.9 NONLINEAR PRINCIPAL COMPONENT ANALYSIS 27
2.5.10 EXPLORATORY PROJECTION PURSUIT 28
2.5.11 THE EXPLORATORY PROJECTION PURSUIT NETWORK 29 2.5.12 COOPERATIVE
MAXIMUM LIKELIHOOD HEBBIAN LEARNING 30 2.5.13 SELF-ORGANIZING MAP 31
2.5.14 CURVILINEAR COMPONENT ANALYSIS 32
2.6 AGENTS AND MULTIAGENT SYSTEMS 33
2.6.1 AGENT TAXONOMY 35
2.6.2 AGENT ARCHITECTURE 36
2.7 CASE-BASED REASONING 36
3 PREVIOUS WORK ON NID 41
3.1 OVERVIEW OF TECHNIQUES FOR NID 41
3.2 VISUALISATION 43
3.2.1 VISUALISATION TECHNIQUES 44
3.2.2 VISUALISED DATA 55
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008972541
DIGITALISIERT DURCH
IMAGE 2
VI CONTENTS
3.3 AGENTS AND MULTIAGENT SYSTEMS 59
3.4 NOVELTIES OF THE PROPOSED IDS 66
4 A NOVEL HYBRID IDS 71
4.1 TARGET ATTACKS 71
4.1.1 SNMP ATTACKS 74
4.2 SYSTEM OVERVIEW 75
4.2.1 NETWORK TRAFFIC CAPTURE AND SELECTION 77
4.2.2 DATA SEGMENTATION 78
4.2.3 DATA ANALYSIS 80
4.2.4 VISUALISATION 80
4.3 MULTIAGENT SYSTEM 81
4.3.1 METHODOLOGY 81
4.3.2 SNIFFER 83
4.3.3 PRE-PROCESSOR 84
4.3.4 ANALYZER 84
4.3.5 CONFIGURATIONMANAGER 87
4.3.6 COORDINATOR 87
4.3.7 VISUALIZER 89
5 EXPERIMENTS AND RESULTS 91
5.1 GICAP-IDS DATASET 91
5.1.1 DATASET DESCRIPTION 92
5.1.2 RESULTS 94
5.2 DARPA DATASET 102
5.2.1 DATASET DESCRIPTION 102
5.2.2 RESULTS 102
6 TESTING AND VALIDATION 105
6.1 MUTATION TESTING TECHNIQUE 106
6.1.1 MUTATING A SAMPLE DATASET 107
6.1.2 MUTATING SEGMENTS 113
6.2 COMPARISON WITH OTHER PROJECTION MODELS 115
6.2.1 PRINCIPAL COMPONENT ANALYSIS 115
6.2.2 CURVILINEAR COMPONENT ANALYSIS 117
6.2.3 SELF-ORGANIZING MAP 118
7 DISCUSSION AND CONCLUSIONS 123
7.1 DISCUSSION 123
7.2 CONCLUSIONS 125
7.3 FUTURE WORK 128
REFERENCES 129 |
any_adam_object | 1 |
author | Herrero, Álvaro Corchado, Emilio |
author_GND | (DE-588)1034345389 |
author_facet | Herrero, Álvaro Corchado, Emilio |
author_role | aut aut |
author_sort | Herrero, Álvaro |
author_variant | á h áh e c ec |
building | Verbundindex |
bvnumber | BV037281912 |
classification_rvk | ST 300 |
ctrlnum | (OCoLC)846285937 (DE-599)DNB1008972541 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037281912</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110315s2011 ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008972541</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642182983</subfield><subfield code="9">978-3-642-18298-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846285937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008972541</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Herrero, Álvaro</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile hybrid intrusion detection</subfield><subfield code="b">the MOVICAB-IDS system</subfield><subfield code="c">Álvaro Herrero and Emilio Corchado</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">146 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">334</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Nachrichtenverkehr</subfield><subfield code="0">(DE-588)4265845-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Visualisierung</subfield><subfield code="0">(DE-588)4188417-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fallbasiertes Schließen</subfield><subfield code="0">(DE-588)4363288-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neuronales Netz</subfield><subfield code="0">(DE-588)4226127-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehragentensystem</subfield><subfield code="0">(DE-588)4389058-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Visualisierung</subfield><subfield code="0">(DE-588)4188417-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Mehragentensystem</subfield><subfield code="0">(DE-588)4389058-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Fallbasiertes Schließen</subfield><subfield code="0">(DE-588)4363288-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Neuronales Netz</subfield><subfield code="0">(DE-588)4226127-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Nachrichtenverkehr</subfield><subfield code="0">(DE-588)4265845-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corchado, Emilio</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1034345389</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Mobile Hybrid Intrusion Detection</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">334</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">334</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3631576&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021194698&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021194698</subfield></datafield></record></collection> |
id | DE-604.BV037281912 |
illustrated | Illustrated |
indexdate | 2024-07-20T11:01:40Z |
institution | BVB |
isbn | 9783642182983 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021194698 |
oclc_num | 846285937 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | 146 S. Ill., graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spelling | Herrero, Álvaro Verfasser aut Mobile hybrid intrusion detection the MOVICAB-IDS system Álvaro Herrero and Emilio Corchado Berlin ; Heidelberg Springer 2011 146 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Studies in computational intelligence 334 Literaturangaben Nachrichtenverkehr (DE-588)4265845-7 gnd rswk-swf Visualisierung (DE-588)4188417-6 gnd rswk-swf Fallbasiertes Schließen (DE-588)4363288-9 gnd rswk-swf Neuronales Netz (DE-588)4226127-2 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Mehragentensystem (DE-588)4389058-1 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 s Kryptoanalyse (DE-588)4830502-9 s Visualisierung (DE-588)4188417-6 s Mehragentensystem (DE-588)4389058-1 s Fallbasiertes Schließen (DE-588)4363288-9 s Neuronales Netz (DE-588)4226127-2 s Nachrichtenverkehr (DE-588)4265845-7 s Netzwerkverwaltung (DE-588)4314339-8 s DE-604 Corchado, Emilio Verfasser (DE-588)1034345389 aut Erscheint auch als Online-Ausgabe Mobile Hybrid Intrusion Detection Studies in computational intelligence 334 (DE-604)BV020822171 334 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3631576&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021194698&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Herrero, Álvaro Corchado, Emilio Mobile hybrid intrusion detection the MOVICAB-IDS system Studies in computational intelligence Nachrichtenverkehr (DE-588)4265845-7 gnd Visualisierung (DE-588)4188417-6 gnd Fallbasiertes Schließen (DE-588)4363288-9 gnd Neuronales Netz (DE-588)4226127-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Mehragentensystem (DE-588)4389058-1 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4265845-7 (DE-588)4188417-6 (DE-588)4363288-9 (DE-588)4226127-2 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4389058-1 (DE-588)4314339-8 |
title | Mobile hybrid intrusion detection the MOVICAB-IDS system |
title_auth | Mobile hybrid intrusion detection the MOVICAB-IDS system |
title_exact_search | Mobile hybrid intrusion detection the MOVICAB-IDS system |
title_full | Mobile hybrid intrusion detection the MOVICAB-IDS system Álvaro Herrero and Emilio Corchado |
title_fullStr | Mobile hybrid intrusion detection the MOVICAB-IDS system Álvaro Herrero and Emilio Corchado |
title_full_unstemmed | Mobile hybrid intrusion detection the MOVICAB-IDS system Álvaro Herrero and Emilio Corchado |
title_short | Mobile hybrid intrusion detection |
title_sort | mobile hybrid intrusion detection the movicab ids system |
title_sub | the MOVICAB-IDS system |
topic | Nachrichtenverkehr (DE-588)4265845-7 gnd Visualisierung (DE-588)4188417-6 gnd Fallbasiertes Schließen (DE-588)4363288-9 gnd Neuronales Netz (DE-588)4226127-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Mehragentensystem (DE-588)4389058-1 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Nachrichtenverkehr Visualisierung Fallbasiertes Schließen Neuronales Netz Kryptoanalyse Eindringerkennung Mehragentensystem Netzwerkverwaltung |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3631576&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021194698&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT herreroalvaro mobilehybridintrusiondetectionthemovicabidssystem AT corchadoemilio mobilehybridintrusiondetectionthemovicabidssystem |